Category Malware & Exploits

WhatsApp 0-Day Exploited in Attacks on iOS and macOS Users

WhatsApp has patched a critical 0-day vulnerability actively exploited against iOS and macOS users. The flaw, tracked as CVE-2025-55177, enabled attackers to deploy zero-click spyware capable of stealing sensitive data without any user interaction. Meta, WhatsApp’s parent company, confirmed that the bug was exploited in targeted attacks against “specific users”…

Read MoreWhatsApp 0-Day Exploited in Attacks on iOS and macOS Users

TamperedChef Infostealer Spread via Fraudulent PDF Editor Ads

Security researchers have uncovered a large-scale malware campaign distributing an infostealer dubbed TamperedChef through fake PDF editing applications. The campaign relied on Google ads to drive victims to fraudulent websites hosting malicious downloads, blending legitimate branding with carefully timed activation of hidden payloads. How the Campaign Works According to researchers,…

Read MoreTamperedChef Infostealer Spread via Fraudulent PDF Editor Ads

Malicious NPM Packages Stole Chrome User Data on Windows

Security analysts from JFrog have identified eight malicious NPM packages designed to steal sensitive information from Google Chrome users on Windows systems. The discovery highlights a growing risk in the software supply chain, where attackers weaponize widely used developer tools to target unsuspecting users. How the Attack Worked JFrog researchers…

Read MoreMalicious NPM Packages Stole Chrome User Data on Windows

Fake Facebook Ads Push Brokewell Spyware to Android Users

Security researchers have uncovered a Facebook malvertising campaign spreading Brokewell spyware to Android devices. The campaign uses fake TradingView ads to lure victims into downloading a trojanized app, which then steals cryptocurrency wallet details, personal data, and other sensitive information. How the Malware Works According to researchers, attackers cloned TradingView…

Read MoreFake Facebook Ads Push Brokewell Spyware to Android Users

macOS Supply Chain Attack “s1ngularity” Steals Thousands of Developer Credentials

Security researchers uncovered a supply chain attack targeting macOS developers that compromised thousands of credentials. The campaign, dubbed “s1ngularity,” exploited versions 20.9.0 to 21.8.0 of Nx, a popular open-source build framework, according to analysis from GitGuardian. The breach highlights the growing overlap between macOS attacks and the broader ecosystem of…

Read MoremacOS Supply Chain Attack “s1ngularity” Steals Thousands of Developer Credentials

AgentFlayer Exploit Targets ChatGPT Connectors to Steal Third-Party App Data

Security researchers just dropped a bombshell about ChatGPT’s newest feature – the AgentFlayer exploit can silently steal your sensitive data from Google Drive, SharePoint, and other connected services without you even knowing it happened. This zero-click attack uses “poisoned” documents loaded with hidden prompt injections that trick ChatGPT into exfiltrating…

Read MoreAgentFlayer Exploit Targets ChatGPT Connectors to Steal Third-Party App Data

Chaos RaaS Emerges After BlackSuit Takedown, Demanding $300K from U.S. Victims

The Chaos RaaS operation has emerged from the ashes of the BlackSuit ransomware takedown, with former gang members launching a fresh wave of attacks targeting American businesses. Law enforcement’s seizure of BlackSuit’s dark web infrastructure didn’t eliminate the threat – it just forced these cybercriminals to rebrand and adapt their…

Read MoreChaos RaaS Emerges After BlackSuit Takedown, Demanding $300K from U.S. Victims

Scattered Spider Attack Targets VMware ESXi with Ransomware

Google’s threat intelligence team dropped alarming details this week about a massive Scattered Spider attack campaign targeting VMware ESXi hypervisors across American corporate networks. The notorious cybercriminal group has been systematically launching ransomware attacks against retail chains, airlines, and insurance companies, using nothing more than smooth-talking phone calls to IT…

Read MoreScattered Spider Attack Targets VMware ESXi with Ransomware

Gunra Ransomware Mimics Conti in Global Windows Attacks

Gunra ransomware has drawn the attention of cybersecurity researchers for its alarming resemblance to Conti, a now-defunct ransomware-as-a-service (RaaS) operation dismantled in 2022. Experts believe Gunra’s developers may be repurposing Conti’s leaked codebase, long circulated across cybercrime forums. Its behavior—automated encryption, shadow copy deletion, and nearly identical ransom notes—mirrors Conti’s…

Read MoreGunra Ransomware Mimics Conti in Global Windows Attacks